Thursday, July 14, 2011

Hackers Exposed Military And Government Accounts

Operation AntiSec is on its way, with more and more government services being compromised. Once again, nearly 17,000 e-mail accounts have been dumped to one of the file-sharing services a while ago. It appeared that the 1.18MB text file was posted by Connexion Hack Team, exposing government and military e-mail addresses and passwords. In addition, lots of popular e-mail providers can also be found in the list of leaked accounts.

It was just a few days ago that Connexion had dumped information from a California government online service. Apparently, now they’ve made another information dump. The Connexion Hack Team released a statement, saying that the emails and passwords were random, and refused to say which website they had come from. Those who suspect their emails to be contained in the list, are encouraged to check it by search, and if it is, to pick another address.

In fact, there are lots of government e-mails from everywhere, including e-mails from the NSA, Virginia, the DHS, and so on. To some of the users’ credit, they did have passwords containing a combination of letters, numbers and symbols, but there were not many of those. The most funny password was “changeme”, which the hackers commented “mega lulz”.

As for the military accounts, there were also a few of them containing a combination of symbols, which meant to take much longer to crack such a password. These were perhaps obtained in another way in this case.

Meanwhile, the rest of e-mails and passwords are all over the map, published in alphabetical order which, strangely enough, end on the letter “s”. It isn’t clear whether there’ll be a second dump or anything after the letter “s” is quite safe for now. Exposed domains include a lot of Yahoo and Spartans.nsu, as well as AOL, Gmail, Hotmail, MSN, BellSouth, Earthlink, Comcast, Sprint.Blackberry, vzpix, sbcglobal, Cox, Verizon, NSU, and many more.

It’s quite hard to know for sure how all of those emails were obtained, if you take into consideration that it was just a random smattering of addresses. Undoubtedly, such accounts will emerge somewhere else for people wondering if their accounts were exposed. Meanwhile, those who want to know it right now are free to download the whole list from MediaFire while it’s still up.

No comments: